EC-Council Accredited Training Provider - Cyber Security Training
EC-Council Accredited Training
EC-Council Certification For The Cyber Security Professional
EC-Council is one of the leading providers of cybersecurity certifications with its flagship Certified Ethical Hacker (CEH) recognised worldwide. The US Department of Defense as well as the National Security Agency and Pentagon have approved several EC-Council certifications for use in works categories defined for cybersecurity roles.
The EC-Council certifications have a strong technical focus and cover a wide range of cybersecurity topics in-depth providing successful candidates with a certification that is accepted worldwide. Most of their certifications consist of a practical as well as a multiple-choice exam.
At Jumping Bean we offer the following EC-Council training courses.
- Certified Network Defender
- Certified Ethical Hacker
- Certified Security Analyst
- Certified Hacking Forensic Investigator
Training Course Formats
We offer our training courses in a range of formats to suit the needs of our students and customers:
- Short Course: This takes the form of full-day, instructor-led, training sessions. It is best suited for corporates or those who already have experience in cybersecurity but wish to take a refresher course before sitting the exam.
- Virtual Instructor Lead Course: This is run either online full time, as above, or part-time. The part-time training is held twice a week in the evenings, online from 6:30 - 7:30. This is ideal for students who cannot attend full-day classes or for students who wish to work through the material between lectures to consolidate their understanding.
- Online, Mentor lead training: This takes the form of self-paced training with access to a mentor via mail, web chat, or video call should a student require assistance to work through some key concepts or material.
What-ever your constraints we will have a format to accommodate you!
EC-Council's Premier Certifications - CEH & ECSA
The most well-known certification from EC-Council is the Certified Ethical Hacker Certification. This highly respected course has been approved by the Pentagon and the US department of defense for including in their cybersecurity training portfolio.
By itself, the CEH course teaches one the techniques hackers use to gain access to systems while the follow-on Security Analyst course provides students with the skill to manage a penetration assignment from engagement to the delivery of the final report. Together both certifications provide proof to employers of one's skill in conducting cybersecurity assignments.
Certified Ethical Hacker (CEH)
CEH is the premier certification from EC-Council. This course teaches students the tools and techniques used by hackers to compromise systems.
After completing this course a student will be able to view their own organisation's infrastructure from the perspective of a threat actor, whether internal or external. It will enable students to assess their own organisations defenses and responses to these threats.
Course Objectives:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
Certified Security Analyst (ECSA)
CHFI trains students on how to carry out digital investigations to determine how a machine was compromised, what was compromised, who the threat actor was, and their objectives. Students will learn how to extract evidence of the attack for use in internal audits or civil or criminal cases. Investigations can cover acts of theft of trade secrets, theft of or destruction of intellectual property, fraud, and industrial espionage. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.
Our training course always covers the latest version of the certification. The previous version of the course, while it is still valid, is available on request.
Course Objectives:
- Computer Forensics in Today's World
- Computer Forensics Investigation Process
- Searching and Seizing Computers
- Digital Evidence
- First Responder Procedures
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Deleted Partitions
- Forensics Investigation using Access Data FTK
- Forensics Investigation Using EnCase
- Steganography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks
- Investigating Web Attacks
- Tracking Emails and investigating Email Crimes
- Mobile Forensics
- Investigative Reports
- Becoming an Expert Witness
Course | Price (inc exams) |
---|---|
Certified Ethical Hacker | R21,000 |
Certified Hacking Forensic Investigator | R21,800 |